CN110222077A - Method of proof and system based on block chain - Google Patents

Method of proof and system based on block chain Download PDF

Info

Publication number
CN110222077A
CN110222077A CN201910468557.0A CN201910468557A CN110222077A CN 110222077 A CN110222077 A CN 110222077A CN 201910468557 A CN201910468557 A CN 201910468557A CN 110222077 A CN110222077 A CN 110222077A
Authority
CN
China
Prior art keywords
client
document
endorsement
inquiry
template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910468557.0A
Other languages
Chinese (zh)
Inventor
温淑华
常小飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shengshi Technology Co Ltd
Original Assignee
Beijing Shengshi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shengshi Technology Co Ltd filed Critical Beijing Shengshi Technology Co Ltd
Priority to CN201910468557.0A priority Critical patent/CN110222077A/en
Publication of CN110222077A publication Critical patent/CN110222077A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses methods of proof and system based on block chain, comprising the following steps: the identity of real-name authentication client, wherein client includes enterprises end and user terminal;Template is respectively configured in different documentary evidences needed for client, corresponding template is obtained according to the client authenticated, and load the configured document of the template;The template is formulated into data rule using granted network, unique identifier corresponding in the document is pushed in alliance's chain by marriage chain code means;The documentary evidence issued in advance is both needed to show after client carries out inquiry authorization before inquiry.The invention has the advantages that: that can not only save workplace in real time to prove and evidence, and workplace data is avoided to play tricks, while screening cost reduces and efficiently.

Description

Method of proof and system based on block chain
Technical field
The present invention relates to block chain technical fields, it particularly relates to a kind of method of proof and system based on block chain.
Background technique
Block chain technology is that calculation of knowing together with storing data, using distributed node is verified using block linked data structure Method guarantees the safety of data transmission and access to generate, using by automatized script with more new data, in the way of cryptography One kind of generation and operation data completely new distributed basis framework and calculation, block chain has decentralization, open, from The property controlled, the characteristic that information can not distort.
In workplace, the possibility that labour dispute occurs exists always, once meeting with, workplace is unexpected, and labourer needs to tie up in accordance with the law Legal labour equity is protected, and it is required for providing corresponding evidence then.Therefore, labourer will improve troxerutine tabtets in accordance with the law, usually Oneself pays attention to everywhere, saves some workplaces proofs and evidence in time, makes provision against emergencies!Meanwhile some workplaces prove not only relationship labor Dynamic equity also influences house indirectly, goes abroad, the life item such as children's schooling, also must pay attention to preservation, in addition for enterprise its Problems faced has: increasing emptily emolument, exaggerates work achievement, false cognition background and Reason for leaving and education experience is played tricks etc. and to be asked Topic, screening cost are high and inefficient;For job hunter, passing workplace credit record can not create value.
For the problems in the relevant technologies, currently no effective solution has been proposed.
Summary of the invention
For above-mentioned technical problem in the related technology, the present invention proposes a kind of method of proof based on block chain, not only Workplace can be saved in real time to be proved and evidence, and workplace data is avoided to play tricks, while screening cost reduces and efficiently.
To realize the above-mentioned technical purpose, the technical scheme of the present invention is realized as follows:
A kind of method of proof based on block chain, comprising the following steps:
The identity of real-name authentication client, wherein client includes enterprises end and user terminal;
Template is respectively configured in different documentary evidences needed for client, corresponding template is obtained according to the client authenticated, and Load the configured document of the template;
The template is formulated into data rule using granted network, marriage chain code means are by unique mark corresponding in the document Know symbol to be pushed in alliance's chain;
The documentary evidence issued in advance is both needed to show after client carries out inquiry authorization before inquiry.
Further, the chain code means include:
Client logs in CA and obtains signing certificate, sends transaction request to endorsement node;
Node of endorsing carries out authority verification, and simulates Chaincode transaction, and return endorsement result of signing;Client receives foot Enough endorsement nodes check endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint by client;
By ordering joint to read-write collection sequence, and according to block arrangement block out, confirmation node is sent by block;
Confirmation node exports after verifying to block, transaction read-write collection and endorsement strategy.
Further, the identity of the real-name authentication client includes:
The document authentication information for inputting client, is uploaded to background server for the authentication information;
The authentication information is audited, the authentication information after audit is subjected to authentication verification by third-party server.
Further, the documentary evidence issued in advance is both needed to displaying after client carries out inquiry authorization before inquiry includes:
Enterprises end receives the document, scans two dimensional code on the document and carries out revene lookup, and sends inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
Further, the documentary evidence issued in advance is both needed to show the list after client carries out inquiry authorization before inquiry According to the raw information for opening cochain, wherein raw information includes document block chain anti-fake code, two dimensional code, electronic-seal and content Information.
Another aspect of the present invention provides a kind of proof system based on block chain, comprising:
Authentication module, the identity for real-name authentication client, wherein client includes enterprises end and user terminal;
Configuration module is obtained for template to be respectively configured in different documentary evidences needed for client according to the client authenticated Corresponding template is taken, and loads the configured document of the template;
Pushing module, for the template to be formulated data rule using granted network, marriage chain code means are by the document In corresponding unique identifier be pushed in alliance's chain;
Authorization module is inquired, for the documentary evidence issued in advance to be both needed to show after client carries out inquiry authorization before inquiry.
Further, the chain code means include:
First sending module logs in CA for client and obtains signing certificate, sends transaction request to endorsement node;
First inspection module, for endorsing, node carries out authority verification, and simulates Chaincode transaction, and return endorsement of signing As a result;Client receives enough endorsement nodes, checks endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint for client by the second sending module;
Third sending module for ordering joint to sort to read-write collection, and according to block arrangement block out, block is sent To confirmation node;
Second correction verification module exports after node verifies block, transaction read-write collection and endorsement strategy for confirming.
Further, authentication module includes:
The authentication information is uploaded to background server for inputting the document authentication information of client by input module;
The authentication information after audit is passed through third-party server for auditing the authentication information by authentication verification module Carry out authentication verification.
Further, the inquiry authorization module includes:
Scan module receives the document for enterprises end, scans two dimensional code on the document and carries out revene lookup, and sends Inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
Further, the documentary evidence issued in advance is both needed to show the list after client carries out inquiry authorization before inquiry According to the raw information for opening cochain, wherein raw information includes document block chain anti-fake code, two dimensional code, electronic-seal and content Information.
Beneficial effects of the present invention: can not only save workplace proof and evidence in real time, and workplace data is avoided to play tricks, Simultaneously screening cost reduce and efficiently.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is the flow chart of the method for proof based on block chain described according to embodiments of the present invention;
Fig. 2 is the flow chart that document according to embodiments of the present invention generates;
Fig. 3 is the flow chart that document according to embodiments of the present invention is issued;
Fig. 4 is the flow chart of area for document authentication according to embodiments of the present invention;
Fig. 5 is the schematic diagram of the proof system based on block chain described according to embodiments of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art's every other embodiment obtained belong to what the present invention protected Range.
As shown in Figs 1-4, a kind of method of proof based on block chain according to embodiments of the present invention, including following step It is rapid:
The identity of real-name authentication client, wherein client includes enterprises end and user terminal;
Specifically, carrying out real-name authentication, i.e. enterprise's real-name authentication and user's real-name authentication, certification to enterprises end and registration user terminal Mode is divided into data automated validation and two kinds of mutual authentication, and authentication field includes but is not limited to Business Name, legal representative, society It can credit code, firm telephone, CompanyAddress and business license information.
Document generation is carried out before real-name authentication, is logged in by enterprises end, is generated interface into document, is selected template content It fills in, generates document, whether confirmation document generates, if confirmation, document is generated, if not confirming, return continues to generate document, Iterative cycles send mailbox for document generation until document generates.
Template is respectively configured in different documentary evidences needed for client, respective mode is obtained according to the client authenticated Plate, and load the configured document of the template;
That is: to meet the custom content configuration feature that different workplace documentary evidences are carried out, file is needed to configure according to scene Field and data type, and the field and data type of file are verified.Such as configuration leaving office proves template, needs at this time It defines ID card No., name, telephone number, registration date, position, date and the Reason for leaving of leaving office and constrains each element Field fills in rule.
Fill substance after selection template, the element field that the content showed at this time as custom-configures in a template are filled out Restrictive verification can be done during writing to each field, such as the leaving office of selection proves template, need to complete to ID card No., Name, telephone number, the typing on registration date, position, leave office date, Reason for leaving etc., Data Elements verification, which finishes, to be generated While movement can the document cover by the corresponding Electronic Signature of organization of our unit's authentication registration and this held document Unique two dimensional code mark show.
By the template using granted network formulate data rule, marriage chain code means by the document it is corresponding only One identifier is pushed in alliance's chain, wherein chain code means are modular code architecture+distributed logic processing, " to need It is to be understood that " it is that principle carrys out public data to the abundant inquiry of immutable distributed account book and there is digital cipher and sensitive data to protect Shield, it is bcrypt that identification information, which selects HASH algorithm, unique identifier corresponding in the document is pushed in alliance's chain is Can not inverse operation, once cochain success if can not change.
The documentary evidence issued in advance is both needed to show after client carries out inquiry authorization before inquiry.
In one particular embodiment of the present invention, the chain code means include:
Client logs in CA and obtains signing certificate, sends transaction request to endorsement node;
Node of endorsing carries out authority verification, and simulates Chaincode transaction, and return endorsement result of signing, wherein endorsement refers to Whether endorsement node checks the request from client received according to the logic of itself, with decision in advance with the mistake of support Journey;Client receives enough endorsement nodes, checks endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint by client, wherein sequence is reached to a batch transaction of a period of time Globally consistent sequence in one network;
By ordering joint to read-write collection sequence, and according to block arrangement block out, confirmation node is sent by block;
Confirmation node exports after verifying to block, transaction read-write collection and endorsement strategy.
Specifically, client (SDK), which logs in CA, obtains signing certificate (ECert);The endorsement section of client (SDK) Xiang Yiding Point (Endorser) sends transaction request (Proposal);Endorsement node (Endorser) carries out authority verification, and simulates Chaincode transaction, as a result Yes/No, and return endorsement result (Endorserment) of signing;Client (SDK) receives enough More endorsements (Endorserment) checks endorsement quantity and whether legal;Client (SDK) sends the transaction by endorsement To ordering joint (Orders);Ordering joint (Orders) sorts to read-write collection, and according to block arrangement block out (Block), and block is sent to confirmation node (Committer);Confirm node (Committer) to block (Block), transaction Read-write collection and endorsement strategy etc. are verified, and Blockchain is written and updates World State DB.
In one particular embodiment of the present invention, the identity of the real-name authentication client includes:
The document authentication information for inputting client, is uploaded to background server for the authentication information;
The authentication information is audited, the authentication information after audit is subjected to authentication verification by third-party server.
Specifically, by Business Name, legal representative, social credibility code, firm telephone, CompanyAddress and business license The information such as information are committed to background server, administrative staff can information submitted to enterprises end carry out authenticity audit, wherein will Enterprises end key message carries out the real-name authentication verifying of external tripartite's data, specific verification process: third party's big data is called to connect Mouthful, when meeting third party's data-interface condition, then interface returned content being obtained in real time, authenticating and successfully then return to success, certification is lost Lose, turn by manual examination and verification enterprise submit information, no matter administrative staff's auditing result whether all can stand in letter message by way of Return the result to certification enterprises end;In addition, following closely the enterprise of inline certification by nail, i.e., requested by sending post to nail nail service Device obtains voucher, further sends post request call acquisition enterprises end authorization message again using the voucher as parameter and then completes Enterprise's application based on nail nail.
In one particular embodiment of the present invention, the documentary evidence issued in advance client is both needed to look into before inquiry Asking displaying after authorizing includes:
Enterprises end receives the document, scans two dimensional code on the document and carries out revene lookup, and sends inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
Specifically, requiring user terminal before all documentary evidence inquiries issued carries out authorization query affirmative action, enterprise End is scanned to two dimensional code on document and initiates inquiry request, user terminal need to scan document two dimensional code after receiving document Into user's registration login interface, cell-phone number, identification card number in document are inputted, registers and logs in by mobile phone identifying code, is logged in The page will will pop up " your information of XXX company application inquiry, if confirmation authorization " afterwards, click [authorization], the authorization that will acquire Code success simultaneously receives i.e. completion authorization movement in a manner of short message, checks and searches for authorization history.
Veritification of the authentication authorization and accounting enterprises end to the document true and false, certification enterprises end receive the two dimensional code scanned after document on document Revene lookup is carried out, authorization will be asked for user terminal transmission authorized application at this time since document content is related to part sensitive data The process of code, authorization code is once obtain the document content that can correctly show with the content matching of cochain, and authorization code mistake is then It can not show;The process that user terminal is authorized in the authorized application for receiving enterprises end verifying application transmission, user terminal authorization Successful enterprise end will obtain the permission of inquiring document content, and otherwise enterprise will be unable to check document content.
Enterprises end authorization conditions are inquired, agree to that then enterprises end scans document two dimensional code for authorization, shows the document automatically and opens The raw information of vertical cochain, forgives document block chain anti-fake code, two dimensional code, electronic-seal and content information.Such as verification from Duty proves that content information then shows ID card No., name, telephone number, registration date, position, leave office date and original of leaving office Because etc..In addition, the block chain anti-fake code by document can be linked in alliance's chain code, it is then true for existing, and there is no i.e. It is false;
In one particular embodiment of the present invention, by the documentary evidence issued in advance be both needed to before inquiry client carry out inquiry award Show that the document opens the raw information of cochain after power, wherein raw information include document block chain anti-fake code, two dimensional code, Electronic-seal and content information.
As shown in figure 5, another aspect of the present invention, provides a kind of proof system based on block chain, comprising:
Authentication module, the identity for real-name authentication client, wherein client includes enterprises end and user terminal;
Configuration module is obtained for template to be respectively configured in different documentary evidences needed for client according to the client authenticated Corresponding template is taken, and loads the configured document of the template;
Pushing module, for the template to be formulated data rule using granted network, marriage chain code means are by the document In corresponding unique identifier be pushed in alliance's chain;
Authorization module is inquired, for the documentary evidence issued in advance to be both needed to show after client carries out inquiry authorization before inquiry.
In one particular embodiment of the present invention, the chain code means include:
First sending module logs in CA for client and obtains signing certificate, sends transaction request to endorsement node;
First inspection module, for endorsing, node carries out authority verification, and simulates Chaincode transaction, and return endorsement of signing As a result;Client receives enough endorsement nodes, checks endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint for client by the second sending module;
Third sending module for ordering joint to sort to read-write collection, and according to block arrangement block out, block is sent To confirmation node;
Second correction verification module exports after node verifies block, transaction read-write collection and endorsement strategy for confirming.
In one particular embodiment of the present invention, authentication module includes:
The authentication information is uploaded to background server for inputting the document authentication information of client by input module;
The authentication information after audit is passed through third-party server for auditing the authentication information by authentication verification module Carry out authentication verification.
In one particular embodiment of the present invention, the inquiry authorization module includes:
Scan module receives the document for enterprises end, scans two dimensional code on the document and carries out revene lookup, and sends Inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
In one particular embodiment of the present invention, the documentary evidence issued in advance client is both needed to look into before inquiry Show that the document opens the raw information of cochain after asking authorization, wherein raw information includes document block chain anti-fake code, two Tie up code, electronic-seal and content information.
In conclusion workplace proof and evidence can not only be saved in real time by means of above-mentioned technical proposal of the invention, and And avoid workplace data from playing tricks, while screening cost reduce and efficiently.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of method of proof based on block chain, which comprises the following steps:
The identity of real-name authentication client, wherein client includes enterprises end and user terminal;
Template is respectively configured in different documentary evidences needed for client, corresponding template is obtained according to the client authenticated, and Load the configured document of the template;
The template is formulated into data rule using granted network, marriage chain code means are by unique mark corresponding in the document Know symbol to be pushed in alliance's chain;
The documentary evidence issued in advance is both needed to show after client carries out inquiry authorization before inquiry.
2. the method for proof according to claim 1 based on block chain, which is characterized in that the chain code means include:
Client logs in CA and obtains signing certificate, sends transaction request to endorsement node;
Node of endorsing carries out authority verification, and simulates Chaincode transaction, and return endorsement result of signing;Client receives foot Enough endorsement nodes check endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint by client;
By ordering joint to read-write collection sequence, and according to block arrangement block out, confirmation node is sent by block;
Confirmation node exports after verifying to block, transaction read-write collection and endorsement strategy.
3. the method for proof according to claim 1 based on block chain, which is characterized in that the real-name authentication client Identity includes:
The document authentication information for inputting client, is uploaded to background server for the authentication information;
The authentication information is audited, the authentication information after audit is subjected to authentication verification by third-party server.
4. the method for proof according to claim 1 based on block chain, which is characterized in that the documentary evidence issued in advance exists Displaying after client carries out inquiry authorization is both needed to before inquiry includes:
Enterprises end receives the document, scans two dimensional code on the document and carries out revene lookup, and sends inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
5. the method for proof according to claim 1-4 based on block chain, which is characterized in that the card that will be issued in advance Prescribed paper is both needed to show that the document opens the raw information of cochain after client carries out inquiry authorization before inquiry, wherein original Information includes document block chain anti-fake code, two dimensional code, electronic-seal and content information.
6. a kind of proof system based on block chain characterized by comprising
Authentication module, the identity for real-name authentication client, wherein client includes enterprises end and user terminal;
Configuration module is obtained for template to be respectively configured in different documentary evidences needed for client according to the client authenticated Corresponding template is taken, and loads the configured document of the template;
Pushing module, for the template to be formulated data rule using granted network, marriage chain code means are by the document In corresponding unique identifier be pushed in alliance's chain;
Authorization module is inquired, for the documentary evidence issued in advance to be both needed to show after client carries out inquiry authorization before inquiry.
7. the proof system according to claim 6 based on block chain, which is characterized in that the chain code means include:
First sending module logs in CA for client and obtains signing certificate, sends transaction request to endorsement node;
First inspection module, for endorsing, node carries out authority verification, and simulates Chaincode transaction, and return endorsement of signing As a result;Client receives enough endorsement nodes, checks endorsement number of nodes and whether legal;
Transaction by endorsement is sent to ordering joint for client by the second sending module;
Third sending module for ordering joint to sort to read-write collection, and according to block arrangement block out, block is sent To confirmation node;
Second correction verification module exports after node verifies block, transaction read-write collection and endorsement strategy for confirming.
8. the proof system according to claim 6 based on block chain, which is characterized in that authentication module includes:
The authentication information is uploaded to background server for inputting the document authentication information of client by input module;
The authentication information after audit is passed through third-party server for auditing the authentication information by authentication verification module Carry out authentication verification.
9. the proof system according to claim 6 based on block chain, which is characterized in that the inquiry authorization module packet It includes:
Scan module receives the document for enterprises end, scans two dimensional code on the document and carries out revene lookup, and sends Inquiry request;
Transmission authorization query application is authorized after user terminal receives inquiry request.
10. according to the described in any item proof systems based on block chain of claim 6-9, which is characterized in that by what is issued in advance Documentary evidence is both needed to show that the document opens the raw information of cochain, Central Plains after client carries out inquiry authorization before inquiry Beginning information includes document block chain anti-fake code, two dimensional code, electronic-seal and content information.
CN201910468557.0A 2019-05-31 2019-05-31 Method of proof and system based on block chain Pending CN110222077A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910468557.0A CN110222077A (en) 2019-05-31 2019-05-31 Method of proof and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910468557.0A CN110222077A (en) 2019-05-31 2019-05-31 Method of proof and system based on block chain

Publications (1)

Publication Number Publication Date
CN110222077A true CN110222077A (en) 2019-09-10

Family

ID=67818920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910468557.0A Pending CN110222077A (en) 2019-05-31 2019-05-31 Method of proof and system based on block chain

Country Status (1)

Country Link
CN (1) CN110222077A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111738737A (en) * 2020-07-31 2020-10-02 支付宝(杭州)信息技术有限公司 Method, device and equipment for generating digital property right certificate
CN112966956A (en) * 2021-03-18 2021-06-15 四川跨客通科技有限公司 Professional ability assessment system and method based on union link contract technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1019869B1 (en) * 1997-04-14 2006-10-11 Cummins-Allison Corporation Image processing network
CN109145275A (en) * 2018-08-07 2019-01-04 广东工业大学 A kind of block chain electronic contract management and intelligent generating system and method
CN109242481A (en) * 2018-06-28 2019-01-18 平安科技(深圳)有限公司 Information approach, device and computer equipment are pledged based on block chain query
CN109492984A (en) * 2018-09-28 2019-03-19 火币(广州)区块链科技有限公司 A kind of accessed enterprise educational background information approach and system based on block chain intelligence contract

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1019869B1 (en) * 1997-04-14 2006-10-11 Cummins-Allison Corporation Image processing network
CN109242481A (en) * 2018-06-28 2019-01-18 平安科技(深圳)有限公司 Information approach, device and computer equipment are pledged based on block chain query
CN109145275A (en) * 2018-08-07 2019-01-04 广东工业大学 A kind of block chain electronic contract management and intelligent generating system and method
CN109492984A (en) * 2018-09-28 2019-03-19 火币(广州)区块链科技有限公司 A kind of accessed enterprise educational background information approach and system based on block chain intelligence contract

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111738737A (en) * 2020-07-31 2020-10-02 支付宝(杭州)信息技术有限公司 Method, device and equipment for generating digital property right certificate
US11501317B2 (en) 2020-07-31 2022-11-15 Alipay (Hangzhou) Information Technology Co., Ltd. Methods, apparatuses, and devices for generating digital document of title
CN112966956A (en) * 2021-03-18 2021-06-15 四川跨客通科技有限公司 Professional ability assessment system and method based on union link contract technology

Similar Documents

Publication Publication Date Title
US6789193B1 (en) Method and system for authenticating a network user
US9167428B2 (en) Method and system for authenticating entities by means of terminals
CN102111275B (en) User authentication and authorization method and system for implementing user authentication and authorization method
CN106067849B (en) Digital signature method and device suitable for PDF document
US8549301B2 (en) Method and computer system for ensuring authenticity of an electronic transaction
US20100161993A1 (en) Notary document processing and storage system and methods
US20080104408A1 (en) Notary document processing and storage system and methods
US20090037230A1 (en) System for Electronic Application of Discounts to Insurance Policies
CN101218782A (en) System and method for warranting electronic mail using a hybrid public key encryption scheme
US8700721B2 (en) Method and system for electronic delivery of essential mail items
CN107317678B (en) A kind of electronics confirmation request processing method Internet-based and system
CN106850693B (en) Real-name authentication method and real-name authentication system
CN110098932A (en) A kind of electronic document signature method based on safe electronic notarization technology
CN110753016B (en) Real name authentication method based on block chain
WO2005076782A2 (en) Use of public switched telephone network for capturing electronic signatures in on-line transactions
CN101090320A (en) Indentify authorization method for dectronic signature
CN107666541B (en) Method for realizing number safety and privacy protection
CN110222077A (en) Method of proof and system based on block chain
CN104394166B (en) The certificate false proof Verification System and method of facing moving terminal under a kind of cloud environment
KR20000049674A (en) Method for providing and authenticating an electronic signature using a web site
CN113114629B (en) Contract management method, device, equipment and storage medium based on block chain
KR20020029926A (en) Method, article and apparatus for registering registrants, such as voter registrants
CN112597473A (en) B2B service security authentication method and device based on enterprise official mailbox and server
KR100455048B1 (en) Method and system for issuing documentary evidence using an internet
CN112632520B (en) Method and system for registering real names of group telephone services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination